public inbox for gcc-patches@gcc.gnu.org
 help / color / mirror / Atom feed
From: Jeff Law <jeffreyalaw@gmail.com>
To: Aldy Hernandez <aldyh@redhat.com>,
	Richard Biener <richard.guenther@gmail.com>
Cc: Jakub Jelinek <jakub@redhat.com>, GCC patches <gcc-patches@gcc.gnu.org>
Subject: Re: [PATCH] [PR tree-optimization/107394] Canonicalize global franges as they are read back.
Date: Thu, 27 Oct 2022 16:45:34 -0600	[thread overview]
Message-ID: <cb821c73-5500-7796-61e3-f6389f44de72@gmail.com> (raw)
In-Reply-To: <20221025210140.125230-1-aldyh@redhat.com>


On 10/25/22 15:01, Aldy Hernandez via Gcc-patches wrote:
> [Richi/Jakub/FP experts, does this sound like the right solution, or am I
> missing some subtle IPA/inlining issue?]
>
> The problem here is that we're inlining a global range with NANs into
> a function that has been tagged with __attribute__((optimize
> ("-ffinite-math-only"))).  As the global range is copied from
> SSA_NAME_RANGE_INFO, its NAN bits are copied, which then cause
> frange::verify_range() to fail a sanity check making sure no NANs
> creep in when !HONOR_NANS.
>
> I think what we should do is nuke the NAN bits as we're restoring the
> global range.  For that matter, if we use the frange constructor,
> everything except that NAN sign will be done automatically, including
> dropping INFs to the min/max representable range when appropriate.
>
> 	PR tree-optimization/107394
>
> gcc/ChangeLog:
>
> 	* value-range-storage.cc (frange_storage_slot::get_frange): Use
> 	frange constructor.
>
> gcc/testsuite/ChangeLog:
>
> 	* gcc.dg/tree-ssa/pr107394.c: New test.

The other approach would be to disabling inlining in this case due to an 
unsafe attribute mismatch, but we're not currently doing much sanity 
checking in this space and it might be a huge can of worms.  I'm 
inclined to ACK, but give Jakub and Richi until Monday to chime in first.


jeff


  parent reply	other threads:[~2022-10-27 22:45 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-10-25 21:01 Aldy Hernandez
2022-10-26  7:57 ` Aldy Hernandez
2022-10-27 22:45 ` Jeff Law [this message]
2022-10-28  6:48   ` Richard Biener
2022-10-28  6:50     ` Richard Biener
2022-10-28  8:23     ` Aldy Hernandez

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cb821c73-5500-7796-61e3-f6389f44de72@gmail.com \
    --to=jeffreyalaw@gmail.com \
    --cc=aldyh@redhat.com \
    --cc=gcc-patches@gcc.gnu.org \
    --cc=jakub@redhat.com \
    --cc=richard.guenther@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).